Tech Trends 2020

Total Page:16

File Type:pdf, Size:1020Kb

Tech Trends 2020 Tech Trends 2020 Contents while (foo = getNext(bar)) { lterThis = false; Introduction | 3 if (condition1) { doSomething(); lterThis = true if (condition2) { doSomethingElse(); lterThis = glob(); } } if (! lterThis) { process(foo); } } Named tokens: 20 Symbolic tokens: 5 ("!", "=", etc.) Brackets and parenths: 24 Executive summary | 5 while (foo = getNext(bar)) { lterThis = false; if (condition1) { doSomething(); lterThis = true if (condition2) { doSomethingElse(); lterThis = glob(); } } if (! lterThis) { process(foo); } } Macro technology forces | 9 Named tokens: 20 Symbolic tokens: 5 ("!", "=", etc.) Brackets and parenths: 24 Ethical technology and trust | 25 Finance and the future of IT | 43 Digital twins: Bridging the physical and digital | 59 Human experience platforms | 79 Architecture awakens | 95 Horizon next: A future look at the trends | 111 Authors and acknowledgments | 124 while (foo = getNext(bar)) { lterThis = false; if (condition1) { doSomething(); lterThis = true if (condition2) { doSomethingElse(); lterThis = glob(); } } if (! lterThis) { process(foo); } } Named tokens: 20 Symbolic tokens: 5 ("!", "=", etc.) Brackets and parenths: 24 Tech Trends 2020 Trending the trends: Eleven years of research CLOUD COGNITIVE DIGITAL EPERIENCE CORE RISK BUSINESS OF TECHNOLOGY BLOCKCHAIN ANALYTICS DIGITAL REALITY Ethical Finance Human technology Horizon the future Architecture Digital experience trust next of IT awakens twins platforms 2020 DevSecOps Beyond Connectivity NoOps in a AI-fueled Intelligent Beyond the cyber the digital serverless 2019 of tomorrow organizations interfaces marketing imperative frontier world The new Risk Exponentials CIO survey: No-collar Reengineering API Blockchain to Enterprise Digital Manifesting data 2018 core implications watch list workforce technology imperative blockchains reality legacy sovereignty Risk Exponentials CIO survey: IT Inevitable Everything- Trust Dark Machine Mixed Navigating 2017 implications watch list unbounded architecture as-a-service economy analytics intelligence reality legacy Reimagining Social CIO survey: core Risk impact of Creating Right- Autonomic Democratized Industrialized Internet AR VR 2016 systems implications exponentials legacy speed IT platforms trust analytics of Things go to work CIO as chief IT worker Software- Core Risk Exponentials API Amplified Ambient Dimensional integration of the defined 2015 renaissance implications economy intelligence computing marketing officer future everything Technical In-memory Cyber Exponentials CIO as Real-time Cloud Cognitive Wearables Digital Social Industrial debt revolution security venture DevOps orchestration analytics engagement activation crowdsourcing 2014 reversal capitalist Reinventing No such CIO as IPv6 (and Finding the Gamification Design as Business Mobile only— Social the ERP thing as postdigital this time face of goes to a discipline of IT and beyond reengineering 2013 engine hacker-proof catalyst we mean it) your data work Outside-in Digital Measured Hyper-hybrid Big data Geospatial Enterprise User Social Gamification architecture identities innovation clouds goes to visualization mobility empowerment business 2012 work Almost- The end of Cyber CIOs as Capability Real Visualization Applied User Social enterprise the death intelligence revolutionaries clouds analytics mobility engagement computing 2011 applications of ERP Best-of-breed CIO Value-driven Services Cyber Virtual- Cloud Information Information Wireless User Asset enterprise operational application thinking security ization revolution automation management mobility engagement intelligence 2010 applications excellence management 2 Introduction Introduction N 2020, THE next stage of digital’s evolution welcomes us with the promise of emotionally intelligent interfaces and hyperintuitive cognitive capabilities that will transform business in unpredictable ways. Yet I as we prepare for the coming decade of disruptive change, we would be wise to remember an important point about yesteryear’s leading-edge innovations: Architects of the 1980s designed mainframe systems that continue to run and generate business value today. Sure, they’re outmoded by today’s standards, but how many of us will build systems that run for decades? And how’s that for a legacy? Architecting for longevity and adaptability requires a deep understanding of both today’s realities and tomorrow’s possibilities. It requires an appreciation for the technology and market forces driving change. And finally, it requires a long-term commitment to focused and incremental progress. Against this backdrop, we present Tech Trends 2020, Deloitte’s 11th annual examination of the emerging technology trends that will affect your organization over the next 18 to 24 months. Several of this year’s trends are responses to persistent IT challenges. Others represent technology-specific dimensions of larger enterprise opportunities. All are poised to drive significant change. We begin Tech Trends 2020 with a timely update on the nine macro technology forces we examined in last year’s report. These forces—digital experience, analytics, cloud, core modernization, risk, the business of technology, digital reality, cognitive, and blockchain—form the technology foundation upon which organizations will build the future. This year’s update takes a fresh look at enterprise adoption of these macro forces and how they’re shaping the trends that we predict will disrupt businesses over the next 18 to 24 months. We also look at three technologies that will likely become macro forces in their own right: ambient experience, exponential intelligence, and quantum. In subsequent chapters, we discuss trends that, though grounded in today’s realities, will inform the way we work tomorrow. Our chapter on ethical technology and trust takes an in-depth look at how every aspect of an organization that is disrupted by technology becomes an opportunity to lose—or earn—the trust of customers, employees, and stakeholders. We follow with a discussion of human experience platforms that will enable tomorrow’s systems to understand context and sense human emotion to respond appropriately. Pioneering organizations are already exploring ways in which these platforms can meet the very human need for connection. 3 Tech Trends 2020 Trends evolve in unexpected ways. And often, the most interesting opportunities happen at the places where they intersect. Several of this year’s trends represent fascinating combinations of macro forces and other technology advances. For instance, digital twins represents the culmination of modernized cores, advanced cognitive models, embedded sensors, and more—a recipe that is in itself a trend, even as it builds on evolving individual technologies. We hope Tech Trends 2020 offers the insights and inspiration you will need for the digital journey ahead. The road from today’s realities to tomorrow’s possibilities will be long and full of surprises, so dream big and architect accordingly. Scott Buchholz Bill Briggs Emerging Technology research director Global chief technology officer and Government & Public Services Deloitte Consulting LLP chief technology officer [email protected] Deloitte Consulting LLP Twitter: @wdbthree [email protected] 4 Executive summary Executive summary Macro technology Ethical technology Finance and the forces and trust future of IT Last year’s Tech Trends report In a growing trend, leading As technology strategy has explored nine macro technology companies are realizing that increasingly become a core forces that form the backbone every aspect of their organization part of business strategy in of business innovation and that is disrupted by technology organizations, the demand for transformation. For a decade, represents an opportunity to improved outcomes has grown. we’ve been tracking the gain or lose trust. They are To achieve this, we expect to emergence and eventual ascent approaching trust not as a see more IT and finance leaders of digital experience, analytics, compliance or public relations working together to develop cloud, digital reality, cognitive, issue, but as a business-critical flexible approaches for innovating blockchain, the business of IT, goal to be pursued. In this light, and operating at the speed risk, and core modernization. This trust becomes a 360-degree of agile. Whether under the year’s update takes a fresh look undertaking to ensure that name of supporting innovation, at enterprise adoption of these the many dimensions across defending against disruption, or macro forces and explores how an organization’s technology, enabling digital transformation, they’re shaping the tech trends processes, and people are IT will need finance’s support to we predict will disrupt businesses working in concert to maintain effectively rethink governance over the next 18 to 24 months. the high level of trust expected of technology innovation, Bill Briggs To realize the full promise of by their many stakeholders. adapt to Agile methodologies, Global chief technology officer these forces, organizations are Business leaders are reevaluating and secure creative capital. Deloitte Consulting LLP exploring how they intersect how their products, services, and The work of transitioning to [email protected] to create more value as well as the decisions they make—around new finance, budgeting, and new ways to manage technology managing data, building a accounting processes that Twitter: @wdbthree and the technology function. partner ecosystem, and training support
Recommended publications
  • Huawei: an Information and Communications Technology Company
    Journal of IT and Economic Development 10(1), 1-10, April 2019 1 Huawei: An Information and Communications Technology Company Walaa Alkhawajah Central Michigan University, USA [email protected], [email protected] Abstract This research paper gives an account of Huawei, a global leader in the provision of Information and Communications Technology (ICT) infrastructure and smart devices. Huawei has grown from a company that offered cheap smartphones in order to appeal to customers to a global leader in the smartphone industry by providing a brand that can compete with Apple and Samsung. The success of Huawei has been linked with the company’s capability to convert the world into a digital globe by providing safe, flexible, and open ICT infrastructure platform to industries and organizations. The company has therefore been able to attract customers from various countries worldwide. Huawei changed its business model of flooding the globe with unbranded and cheap phones and now produces high-quality and branded phones. Politics have hampered the company's growth in the US. However, in Sub-Saharan Africa, its growth has been remarkable as Africa is a high-quality network provider at a low cost. The Middle East is an imperative market as both a region and a growth driver. The massive growth has been attributed to the ambitious projects undertaken by Huawei. It has improved its competitive advantage by outsmarting the current technology by the development of 5G networks. The company has also achieved viable leadership through the rotation of its CEOs. It has been offering the best phones in the market through the provision of phones with high-quality cameras.
    [Show full text]
  • The Zeitgeist Movement Defined
    THE ZEITGEIST MOVEMENT DEFINED REALIZING A NEW TRAIN OF THOUGHT ”The tremendous and still accelerating development of science and technology has not been accompanied by an equal development in social, economic, and political patterns...We are now...only beginning to explore the potentialities which it offers for developments in our culture outside technology, particularly in the social, political and economic fields. It is safe to predict that...such social inventions as modern-type Capitalism, Fascism, and Communism will be regarded as primitive experiments directed toward the adjustment of modern society to modern technology” - Dr. Ralph Linton www.thezeitgeistmovement.com The Zeitgeist Movement Defined Realizing a New Train of Thought 1st Edition, January, 2014 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) The content in this text may be reproduced only for non-commercial purposes and may not be resold in any form. Any other interests require direct approval by TZM Global. Contact: [email protected] This is a 100% non-profit text. Any price paid is only for the physical publishing. Any exploitation of this work for profit will not be tolerated. Acknowledgments: The material authored here is the product of many forms of contribution, specifically the research of The Zeitgeist Movement's expanding lecture team. An enormous thanks extends to all who have contributed news, sources, tips and other forms of research. If you would like to help in translating this text, please contact TZM's linguistics team: [email protected] ISBN-13: 978-1495303197 ISBN-10: 1495303195 Contents Preface ................................................................................................... 1 Part I: Introduction Essay 1: Overview ..................................................................................
    [Show full text]
  • Top 10 Emerging Technologies 2019
    Insight Report Top 10 Emerging Technologies 2019 June 2019 World Economic Forum 91-93 route de la Capite CH-1223 Cologny/Geneva Switzerland Tel.: +41 (0)22 869 1212 Fax: +41 (0)22 786 2744 Email: [email protected] www.weforum.org © 2019 World Economic Forum. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, including photocopying and recording, or by any information storage and retrieval system. Contents Introduction 4 The top 10 emerging technologies for 5 2019 1. Bioplastics for a Circular 6 Economy 2. Social Robots 7 3. Tiny Lenses for Miniature 8 Devices 4. Disordered Proteins as Drug 9 Targets 5. Smarter Fertilizers Can Reduce 10 Environmental Contamination 6. Collaborative Telepresence 11 7. Advanced Food Tracking and 12 Packaging 8. Safer Nuclear Reactors 13 9. DNA Data Storage 14 10. Utility-Scale Storage of 15 Renewable Energy Acknowledgements 16 Steering Committee 16 Guest Authors 16 Report Team 16 Production Team 16 Top 10 Emerging Technologies 2019 3 Introduction World-changing technologies that are poised to rattle the status quo One day soon an emerging technology highlighted in this report will allow you to virtually teleport to a distant site and actually feel the handshakes and hugs of fellow cyber-travellers. Also close to becoming commonplace: humanoid (and animaloid) robots designed to socialize with people; a system for pinpointing the source of a food-poisoning outbreak in seconds; minuscule lenses that will pave the way for diminutive cameras and other devices; strong, biodegradable plastics that can be fashioned from otherwise useless plant wastes; DNA-based data storage systems that will reliably stow ginormous amounts of information; and much more.
    [Show full text]
  • Annual Report 2016 22 March 2017 Table of Contents
    Annual report 2016 22 March 2017 Table of contents Overview 5 Highlights 5 Message from the chairman 6 About Delta Lloyd 8 Our brands 8 Our strategy 9 Our environment 12 How we create value 14 Value creation model 14 Delta Lloyd’s contribution to the UN SDGs 16 Stakeholders and materiality 17 Materiality assessment 20 Delta Lloyd in 2016 23 Capital management 27 Financial and operational performance 29 Life Insurance 31 General Insurance 34 Asset Management 37 Bank 39 Corporate and other activities 41 Investor relations and share developments 41 Human capital 46 Risk management and compliance 50 Risk management 50 Risk management philosophy 50 Risk governance 51 Risk management responsibilities 52 Risk processes and systems 53 Risk culture 54 Risk taxonomy 55 Top five risks 58 Compliance 61 Fraud 62 Corporate governance 64 Executive Board and Supervisory Board 64 Executive Board 64 Supervisory Board 64 Supervisory Board committees 65 Report of the Supervisory Board 66 Role of the Supervisory Board 67 Strategy 67 Key issues in 2016 68 Other issues 69 Supervisory Board composition 70 Supervisory Board meetings 70 Supervisory Board committees 71 Financial statements and profit appropriation 75 A word of thanks 76 Remuneration report 2016 77 Remuneration policy 77 Governance of the remuneration policy 77 Remuneration received by Executive Board members 81 Remuneration of the Supervisory Board 93 Corporate governance 96 Corporate governance statement 104 EU directive on takeover bids 104 In control statement 106 Management statement under Financial
    [Show full text]
  • New California 100 Innovative Businesses
    New California 100 Innovative Businesses Selected from an initial group of over 400 nominees, the 2009 New California 100 Innovative Businesses list represents a broad cross-section of the most innovative and economically impactful companies in the state. Endorsed by the California Business, Transportation and Housing Agency, New California 100 companies are recognized here for their important contributions to the state economy. 3Prong Power Berkeley, CA www.3prongpower.com 3Prong Power is delivering enhanced Toyota Prius Plug-in Hybrid Electric Vehicles (PHEV) conversions for our customers. Their goal is to meet and expand the demand for PHEVs that has been seen nationwide, starting in the Bay Area. Ahern International Seeds San Diego, CA www.ahrenseeds.com Ahern International Seeds is a private company categorized under Seeds & Bulbs-Wholesale. This company strives to set new standards in the produce industry with improved disease resistance, virus resistance, yields, plant vigor and product appearance. They are an international seed company with years of technical experience, dependable customer service and an extensive line of high quality vegetable seeds. Airsis, Inc. San Diego, CA www.airsis.com AIRSIS, Inc. is a diversified technology company with a 10 year track record of providing innovative solutions to a wide range of customers. They have three main business lines: internet software development, remote asset management, and maritime solutions. They offer standard products, custom solutions, and engineering support. What links the three businesses is a common mission to apply technology solutions that help organizations perform more effectively. American Medical Bill Review Redding, CA www.ambr.com AMBR specializes in medical bill review and delivers the most effective medical cost containment services in the marketplace.
    [Show full text]
  • Business Model Blueprints for the Shared Mobility Hub Network
    sustainability Article Business Model Blueprints for the Shared Mobility Hub Network Elnert Coenegrachts * , Joris Beckers , Thierry Vanelslander and Ann Verhetsel Department of Transport and Regional Economics (TPR), University of Antwerp, 2000 Antwerp, Belgium; [email protected] (J.B.); [email protected] (T.V.); [email protected] (A.V.) * Correspondence: [email protected] Abstract: Shared (electric) mobility is still facing challenges in terms of reaching its potential as a sustainable mobility solution. Low physical and digital integration with public transport, a lack of charging infrastructure, the regulatory barriers, and the public nuisance are hindering the uptake and organization of shared mobility services. This study examines the case of the shared mobility hub, a location where shared mobility is concentrated, as a solution to overcome these challenges. To find ideas informing how a network of shared mobility hubs can contribute to sustainable urban mobility and to overcome the aforementioned challenges, a business model innovation approach was adopted. Focus groups, consisting of public and private stakeholders, collaboratively designed five business model (BM) blueprints, reaching a consensus about the value creation, delivery, and capture mechanisms of the network. The blueprints, defined as first-/last-mile, clustered, point-of- interest (POI), hybrid, and closed mobility hub networks, provide alternative solutions to integrate sustainable transportation modes into a coherent network, enabling multi- and intermodal travel behaviour, and supporting interoperability, sustainable land use, and ensured access to shared Citation: Coenegrachts, E.; Beckers, (electric) travel modes. However, which kind of network the local key stakeholders need to commit J.; Vanelslander, T.; Verhetsel, A. to depends on the local policy goals and regulatory context.
    [Show full text]
  • Automated Restaurant Service Management System
    Proceedings of National Level E-Conference on "Science & Technology" Organized by Shahajirao Patil Vikas Pratishthan's S. B. PATIL College of Engineering Indapur, Maharashtra, India INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN No.: 2394-3696, Website: ijiert.org, Held on 15th and 16th June 2020. AUTOMATED RESTAURANT SERVICE MANAGEMENT SYSTEM Kalpesh V. Joshi, Akshay P. Dhawale, Chinmay Y. Dhekane, Kshitij S. Dhone, Mugdha P. Dhopade, Vipul P. Dhopate, Aditya S. Dhotarkar Department of Engineering, Sciences and Humanities (DESH) Abstract — Today, in the era of rapid advancement in the especially in the developed and developing nations. technology, the world attempts to automate every possible task ensuring ease to human life with improved work- II. LITERATURE REVIEW efficiency and quality [1]. This report describes in detail the It is common if customers complain for not feeling satisfied design, development and functionality of a Smart On-Floor about the services offered there are many reasons leading to Service Management System developed exclusively for the feeling of dissatisfaction including being entertain late in restaurants. The system comprises of an online wireless terms of order taken by the waiter and meals serving the issue module enabling the customers to order food from the of being late entertain could be solved with the help of the comfort of their respective tables via tablet phones; and a advancement in the technologies of the communication [1]. In robot for delivering the dishes to the customers at their accordance, this study initiates an integrated a networked respective tables. The order once placed and confirmed by system, with the focus is on its ability to solve the above the customers will be directed to the kitchen on a LCD describe limitation in order taking [2].
    [Show full text]
  • Algebraic Attacks on SOBER-T32 and SOBER-T16 Without Stuttering
    Algebraic Attacks on SOBER-t32 and SOBER-t16 without stuttering Joo Yeon Cho and Josef Pieprzyk? Center for Advanced Computing – Algorithms and Cryptography, Department of Computing, Macquarie University, NSW, Australia, 2109 {jcho,josef}@ics.mq.edu.au Abstract. This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two differ- ent attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting system of equa- tions contains 269 equations and monomials, which can be solved using the Gaussian elimination with the complexity of 2196.5. For the second attack, we build a multivariate equation of degree 14. We focus on the property of the equation that the monomials which are combined with output bit are linear. By applying the Berlekamp-Massey algorithm, we can obtain a system of linear equations and the initial states of the LFSR can be recovered. The complexity of attack is around O(2100) with 292 keystream observations. The second algebraic attack is applica- ble to SOBER-t16 without stuttering. The attack takes around O(285) CPU clocks with 278 keystream observations. Keywords : Algebraic attack, stream ciphers, linearization, NESSIE, SOBER-t32, SOBER-t16, modular addition, multivariate equations 1 Introduction Stream ciphers are an important class of encryption algorithms. They encrypt individual characters of a plaintext message one at a time, using a stream of pseudorandom bits.
    [Show full text]
  • VMPC-MAC: a Stream Cipher Based Authenticated Encryption Scheme
    VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme Bartosz Zoltak http://www.vmpcfunction.com [email protected] Abstract. A stream cipher based algorithm for computing Message Au- thentication Codes is described. The algorithm employs the internal state of the underlying cipher to minimize the required additional-to- encryption computational e®ort and maintain general simplicity of the design. The scheme appears to provide proper statistical properties, a comfortable level of resistance against forgery attacks in a chosen ci- phertext attack model and high e±ciency in software implementations. Keywords: Authenticated Encryption, MAC, Stream Cipher, VMPC 1 Introduction In the past few years the interest in message authentication algorithms has been concentrated mostly on modes of operation of block ciphers. Examples of some recent designs include OCB [4], OMAC [7], XCBC [6], EAX [8], CWC [9]. Par- allely a growing interest in stream cipher design can be observed, however along with a relative shortage of dedicated message authentication schemes. Regarding two recent proposals { Helix and Sober-128 stream ciphers with built-in MAC functionality { a powerful attack against the MAC algorithm of Sober-128 [10] and two weaknesses of Helix [12] were presented at FSE'04. This paper gives a proposition of a simple and software-e±cient algorithm for computing Message Authentication Codes for the presented at FSE'04 VMPC Stream Cipher [13]. The proposed scheme was designed to minimize the computational cost of the additional-to-encryption MAC-related operations by employing some data of the internal-state of the underlying cipher. This approach allowed to maintain sim- plicity of the design and achieve good performance in software implementations.
    [Show full text]
  • ARCHITECTS of INTELLIGENCE for Xiaoxiao, Elaine, Colin, and Tristan ARCHITECTS of INTELLIGENCE
    MARTIN FORD ARCHITECTS OF INTELLIGENCE For Xiaoxiao, Elaine, Colin, and Tristan ARCHITECTS OF INTELLIGENCE THE TRUTH ABOUT AI FROM THE PEOPLE BUILDING IT MARTIN FORD ARCHITECTS OF INTELLIGENCE Copyright © 2018 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. Acquisition Editors: Ben Renow-Clarke Project Editor: Radhika Atitkar Content Development Editor: Alex Sorrentino Proofreader: Safis Editing Presentation Designer: Sandip Tadge Cover Designer: Clare Bowyer Production Editor: Amit Ramadas Marketing Manager: Rajveer Samra Editorial Director: Dominic Shakeshaft First published: November 2018 Production reference: 2201118 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK ISBN 978-1-78913-151-2 www.packt.com Contents Introduction ........................................................................ 1 A Brief Introduction to the Vocabulary of Artificial Intelligence .......10 How AI Systems Learn ........................................................11 Yoshua Bengio .....................................................................17 Stuart J.
    [Show full text]
  • Fractional Authorship & Publication Productivity
    ICSR PERSPECTIVES ICSR Fractional Authorship & Publication Productivity Highlights Authors divide their research output across publications, contributing via research collaborations The trend is for authors to produce more publications per year (increased fractionalization) but for the overall number of publications per author to decrease We suggest that the effort required to participate in research collaborations is a factor in the decrease in publications per author AUGUST 2019 AUGUST Are authors collaborating more in response to the pressure to publish? Growth in the number The “publish or perish” research reasons; for instance, to gain access of scholarly publications culture provides incentives for to samples, field sites, research each year has been well researchers to have long publication facilities, or patient groups. lists on their CVs, especially where Researchers wishing to study topics documented (e.g., Bornmann those publications appear in high- outside their own expertise require & Mutz, 2015, Figure 1). But impact journals (Tregoning, 2018). interdisciplinary collaborators or may how has that growth been By examining authorship trends, we simply look to find co-authors whose achieved? Is it purely due aim to understand if researchers are skills and knowledge complement to increasing investment in responding to the pressure to publish their own. Evidence suggests that research, resulting in a greater by fractionalizing themselves across diverse research teams are more more papers and whether this leads likely to be successful at problem number of active researchers? to more publication outputs overall. solving (e.g., Phillips, Northcraft, & Or is each researcher Does increasing collaboration enable Neale, 2006) and that publications producing more publications? each researcher to be involved with, by collaborative teams benefit from To investigate these questions, and produce more, research? a citation advantage (e.g., Glanzel, we build on Plume & van 2001).
    [Show full text]
  • Re-Excavated: Debunking a Fallacious Account of the JAFFE Dataset Michael Lyons
    ”Excavating AI” Re-excavated: Debunking a Fallacious Account of the JAFFE Dataset Michael Lyons To cite this version: Michael Lyons. ”Excavating AI” Re-excavated: Debunking a Fallacious Account of the JAFFE Dataset. 2021. hal-03321964 HAL Id: hal-03321964 https://hal.archives-ouvertes.fr/hal-03321964 Preprint submitted on 18 Aug 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives| 4.0 International License “Excavating AI” Re-excavated: Debunking a Fallacious Account of the JAFFE Dataset Michael J. Lyons Ritsumeikan University Abstract Twenty-five years ago, my colleagues Miyuki Kamachi and Jiro Gyoba and I designed and photographed JAFFE, a set of facial expression images intended for use in a study of face perception. In 2019, without seeking permission or informing us, Kate Crawford and Trevor Paglen exhibited JAFFE in two widely publicized art shows. In addition, they published a nonfactual account of the images in the essay “Excavating AI: The Politics of Images in Machine Learning Training Sets.” The present article recounts the creation of the JAFFE dataset and unravels each of Crawford and Paglen’s fallacious statements.
    [Show full text]